Security News
8:36 PM (52 minutes ago)
Caching bugs exposed in second biggest DNS server
Birthday Paradox stumps djbdns
For years, cryptographer Daniel J. Bernstein has touted his djbdns as so secure he promised a $1,000 bounty to anyone who can poke holes in the domain name resolution software.…
2:36 PM (6 hours ago)
Camelot dismisses lottery website hack claims
Unu strikes again
Camelot maintains the National Lottery website it runs is secure, following the publication of a supposed breach on an underground hacking forum.…
8:36 AM (12 hours ago)
Chinese internet surveillance boss arrested for bungs
Anti-virus intrigue
A top Chinese censor has been arrested over suspicions he took millions in bribes to help a local anti-virus firm to crush a competitor.…
7:36 AM (13 hours ago)
Second rogue Facebook app bewilders users
Poisoned mushrooms and spam
Scoundrels have created another rogue Facebook application, the second to hit the social networking site in less than a week.…
12:44 PM (8 hours ago)
5 Facebook Scams: Protect Your Profile
from Network World on Security by Jr Raphael
Beny Rubinstein knows computer security. An employee of a Seattle-area tech giant with 20 years of IT experience under his belt, Rubinstein has seen a side of the industry that most people will never know. He holds a degree in computer engineering, and - oh yeah - he just got scammed out of $1100 on Facebook.
12:44 PM (8 hours ago)
Most Oracle database shops don't mandate security patch use
from Network World on Security by Jaikumar Vijayan
A continuing lack of corporate mandates to quickly install Oracle's security patches may be leaving many Oracle database installations exposed to vulnerabilities for extended periods of time, according to survey results released on Wednesday.
12:44 PM (8 hours ago)
How to Achieve More 'Agile' Application Security
from Network World on Security by Kevin Coleman
Application security has become a critical component of all software development efforts. It includes all measures taken throughout the software development lifecycle to prevent programming flaws from being exploited. The flaws that creep in during the requirements, design, development, deployment, upgrades, or maintenance stages of applications become the basis of cyber attacks.
9:04 AM (12 hours ago)
Obama Budget Eyes Boost to Cybersecurity Funds
from Wired Top Stories by Reuters
WASHINGTON (Reuters) - The budget proposed by President Barack Obama includes funding aimed at improving the security of U.S. private and public computer networks.
"The threat to federal information technology networks is real, serious and growing," said an outline of the budget proposal for fiscal 2010 that begins October 1 and released by the Obama administration on Thursday.
The document called for $355 million in funding for the Department of Homeland Security to make private and public sector cyber infrastructure more resilient and secure.
The money would help support the operations of the National Cyber Security Division, as well as initiatives under the Comprehensive National Cybersecurity Initiative, according to the document.
In addition, the administration said it would put "substantial" funding for cybersecurity efforts into the national intelligence program, but gave no details since that funding is kept secret.
That money would be used for "an integrated and holistic approach to address current cybersecurity threats, anticipate future threats, and continue innovative public-private partnerships," it said.
1:39 PM (8 hours ago)
Smartphones Need Smart Security
from PC World Latest Technology News
Half of all global manufacturers report mobile malware infections, third-party application problems, and spam attacks.
Other News
6:44 PM (2 hours ago)
Oracle to Release Major Enterprise Manager Upgrade
from PC World Latest Technology News
Oracle is introducing a major upgrade to its Enterprise Manager platform on Tuesday.
12:39 PM (9 hours ago)
10 Reasons to Avoid Office 2007
from PC World Latest Technology News
Upgrading is inevitable, but migration will be much easier if you're aware of and address these concerns.
No comments:
Post a Comment